System and Method for High-Assurance Data Storage and Processing based on Homomorphic Encryption

a data storage and homomorphic encryption technology, applied in the field of data storage and processing, can solve the problems of data theft becoming a much bigger problem, data breaches and theft episodes being reported all over the world, etc., and achieve the effect of reducing service quality, assessing master node service quality, and reducing service quality

Active Publication Date: 2016-11-03
THE UNITED STATES OF AMERICA AS REPRESENTED BY THE SECRETARY OF THE NAVY
View PDF4 Cites 42 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0004]Described herein is a key value storage (KVS) system comprising: a client-side agent and first, second, and third nodes. The client-side agent is configured to encrypt data, and only the client-side agent can decrypt the data. The first, second, and third nodes are hosted respectively in first, second, and third cloud service providers. Each of the first, second, and third nodes comprises: a management node, a homomorphic encryption (HE) key manager, a homomorphic encryption and processing engine, a homomorphic memory store, and a hypervisor. Each management node is configured to receive encrypted data from the client-side agent. Each HE key manager is communicatively coupled to the management node and configured to fetch a public key of a given object in the KVS system to enable object key to public key mapping. Each homomorphic encryption and processing engine is communicatively coupled to the management node and configured to execute commands over the encrypted data without decrypting it. Each homomorphic memory store is communicatively coupled to the management node. Each hypervisor is communicatively coupled to the management node and configured to monitor performance of the management node in order to assess the quality of service of the management node. Each of the first, second, or third nodes serves on a rotating basis in a master node role, a secondary node role, or a back-up node role. The first, second, and third nodes rotate their roles when the master node's hypervisor detects a reduced quality of service of

Problems solved by technology

Moreover, over the past decade, data breaches and theft episodes are being reported all over the world.
This means that the problem is twofold: 1) data availability is critical in the information age, and

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and Method for High-Assurance Data Storage and Processing based on Homomorphic Encryption
  • System and Method for High-Assurance Data Storage and Processing based on Homomorphic Encryption
  • System and Method for High-Assurance Data Storage and Processing based on Homomorphic Encryption

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025]The disclosed methods and systems below may be described generally, as well as in terms of specific examples and / or specific embodiments. For instances where references are made to detailed examples and / or embodiments, it should be appreciated that any of the underlying principles described are not to be limited to a single embodiment, but may be expanded for use with any of the other methods and systems described herein as will be understood by one of ordinary skill in the art unless otherwise stated specifically.

[0026]FIG. 1 is an illustration of a key value storage (KVS) system 10 comprising, consisting of, or consisting essentially of a client-side agent 12 and first, second, and third nodes 14, 16, and 18 respectively. The client-side agent 12 is configured to encrypt data, and only the client-side agent 12 can decrypt the data. The first, second, and third nodes 14, 16, and 18 are hosted respectively in first, second, and third clouds 20, 22, and 24 provided by different...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A key value storage (KVS) system comprising: a client-side agent configured to encrypt data; three nodes hosted respectively in three cloud service providers, wherein each node comprises: a management node configured to receive encrypted data from the client-side agent, a homomorphic encryption (HE) key manager configured to fetch a public key of a given object in the KVS system, a homomorphic encryption and processing engine configured to execute commands over the encrypted data without decrypting it, a homomorphic memory store, a hypervisor configured to monitor performance of the management node in order to assess the quality of service of the management node; and wherein each node serves on a rotating basis in a master node role, a secondary node role, or a back-up node role, wherein the nodes rotate their roles when the master node's hypervisor detects a reduced quality of service of the master node's management node.

Description

FEDERALLY-SPONSORED RESEARCH AND DEVELOPMENT[0001]The United States Government has ownership rights in this invention. Licensing and technical inquiries may be directed to the Office of Research and Technical Applications, Space and Naval Warfare Systems Center, Pacific, Code 72120, San Diego, Calif., 92152; voice (619) 553-5118; ssc_pac_t2@navy.mil. Reference Navy Case Number 102930.CROSS-REFERENCE TO RELATED APPLICATION[0002]This application is related to U.S. Application No.: UNKNOWN, filed EVEN DATE, titled “Cybernaut: A Cloud-Oriented Energy-Efficient Intrusion-Tolerant Hypervisor” (Navy Case #102492), which application is hereby incorporated by reference herein in its entirety for its teachings.BACKGROUND OF THE INVENTION[0003]This invention relates to the field of data storage and processing. Data storage systems are critical to the information age. With over 100 terabytes of data uploaded to the internet on a daily basis (as of 2012), and with 35 zettabytes of data expected ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/00G06F9/455H04L9/08
CPCH04L9/008H04L9/0816H04L2209/24G06F2009/45587G06F9/45558H04L63/0428H04L63/06H04L63/00
Inventor BATHEN, LUIS ANGEL D.
Owner THE UNITED STATES OF AMERICA AS REPRESENTED BY THE SECRETARY OF THE NAVY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products